Process query systems for network security monitoring

被引:3
作者
Berk, V [1 ]
Fox, N [1 ]
机构
[1] Dartmouth Coll, Thayer Sch Engn, Hanover, NH 03755 USA
来源
Sensors, and Command, Control, Communications, and Intelligence (C31) Technologies for Homeland Security and Homeland Defense IV, Pts 1 and 2 | 2005年 / 5778卷
关键词
D O I
10.1117/12.609855
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In this paper we present the architecture of our network security monitoring infrastructure based on a Process Query System (PQS). PQS offers a new and powerful way of efficiently processing data streams, based on process descriptions that are submitted as queries. In this case the data streams are familiar network sensors, such as Snort, Netfilter, and Tripwire. The process queries describe the dynamics of network attacks and failures, such as worms, multistage attacks, and router failures. Using PQS the task of monitoring enterprise class networks is simplified, offering a priority-based GUI to the security administrator that clearly outlines events that require immediate attention. The PQS-Net system is deployed on an unsecured production network; the system has successfully detected many diverse attacks and failures.
引用
收藏
页码:520 / 530
页数:11
相关论文
共 50 条
  • [21] Present and Future of Network Security Monitoring
    Fuentes-Garcia, Marta
    Camacho, Jose
    Macia-Fernandez, Gabriel
    IEEE ACCESS, 2021, 9 : 112744 - 112760
  • [22] Network security monitoring - Intrusion detection
    Davis, J
    Hill, E
    Spradley, L
    Wright, M
    Scherer, W
    Zhang, YY
    2003 IEEE SYSTEMS & INFORMATION ENGINEERING DESIGN SYMPOSIUM, 2003, : 241 - 246
  • [23] A survey on the efficiency, reliability, and security of data query in blockchain systems
    Zhang, Qizhi
    He, Yale
    Lai, Ruilin
    Hou, Zhihao
    Zhao, Gansen
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 145 : 303 - 320
  • [24] A Web-Based Monitoring System of Network Security Functions in Blockchain-Based Cloud Security Systems
    Kim, Jeonghyeon
    Lingga, Patrick
    Jeong, Jaehoon Paul
    Choi, Yunchul
    Park, JungSoo
    36TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2022), 2022, : 454 - 459
  • [25] Security in Process Migration Systems
    Echaiz, Javier
    Ardenghi, Jorge
    JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY, 2005, 5 (04): : 305 - 311
  • [26] A Study of Network Security Systems
    Khalil, Ramy K.
    Zaki, Fayez W.
    Ashour, Mohamed M.
    Mohamed, Mohamed A.
    SELECTED TOPICS IN APPLIED COMPUTER SCIENCE, 2010, : 96 - +
  • [27] Multidimensional Preference Query Optimization on Infrastructure Monitoring Systems
    Qin, Yinghua
    Guzun, Gheorghi
    2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 3727 - 3736
  • [28] Network Systems Security Analysis
    Yilmaz, Ismail
    CYBER SENSING 2015, 2015, 9458
  • [29] A Study of Network Security Systems
    Khalil, Ramy K.
    Zaki, Fayez W.
    Ashour, Mohamed M.
    Mohamed, Mohamed A.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (06): : 204 - 212
  • [30] Process security in the network of pharmaceutical companies
    Loock, D
    PHARMAZEUTISCHE INDUSTRIE, 2004, 66 (11A): : 1387 - 1389